Home / Cyber (page 4)

Cyber

DARPA DPRIVE developing an ASIC for Fully homomorphic encryption (FHE) to ensure Data privacy and Security

In the last few years, data privacy has become a hot-button issue globally, with high profile scandals and data leaks surrounding prominent companies like Facebook and Equifax resulting in greater privacy awareness among both consumers and businesses. On top of that, companies often share this data with third parties that can …

Read More »

Quantum Computer Threat on Digital Infrastructure Requires Quantum-Proof Cryptography: NIST Standardizing Post-Quantum Cryptographic Algorithms

Introduction: The world is on the brink of a quantum revolution, as quantum computers inch closer to becoming a reality. With their unprecedented computational power, quantum computers pose a significant threat to the cryptographic algorithms that currently protect our digital infrastructure. To address this imminent danger, the need for quantum-proof …

Read More »

Rising cyber attacks on Health-Care Organization posing grave threat to patient safety

Hospitals, pharmacies, care centers and other healthcare organizations are prime targets for malicious cyber-criminals. There are a few reasons for this: healthcare organizations deal with huge amounts of personal and private data, which can be hugely valuable for criminal groups. Healthcare organizations often cannot afford to invest in the latest …

Read More »

NATO cyber doctrine and command calls for enhancing Deterrence and cyber defense capabilities amid Russian and Chinese Cyber Warfare Threat

The North Atlantic Treaty Organization is an alliance of European and North American countries formed after World War II as a bulwark against Russian aggression, as per The Associated Press. Its original members were Belgium, Canada, Denmark, France, Iceland, Italy, Luxembourg, the Netherlands, Norway, Portugal, the United Kingdom, and the …

Read More »

Cyber Resilience enables company to better prevent, quickly detect, contain, and recover from a cyberattack

This year has been largely dominated by the Russia-Ukraine war, with major concerns about its impact on the global threat level. Just three days after the invasion of Ukraine, on February 27th, Check Point Research (CPR) noted a 196% increase in cyber-attacks on Ukraine’s government-military sector, and a 4% increase …

Read More »

DARPA HARDEN developing designs and tools for trusted computing systems

Hardware Trojans (HT), which are malicious circuit inclusions into the design from an adversary with an intention to damage the functionality of the chip at a much later date or leaking confidential information like keys used in cryptography. Time to market demand has forced integrated circuit design, manufacturing and testing …

Read More »

DARPA CASTLE developing AI-toolkit for network hardening against advanced persistent threats (APT)

Computer networks are more than ever exposed to cyber threats of increasing frequency, complexity and sophistication. Penetration testing (also known as pentesting or PT) is a common practice for actively assessing the defenses of a computer network by planning and executing all possible attacks to discover and exploit existing vulnerabilities. In …

Read More »

DARPA SMOKE to automate cyber red teaming or penetration testing to uncover military systems vulnerabilites

Cyberattacks are being conducted daily on any type of target, and any notion that a state of full cyber security can be reached is a mere illusion. Cybersecurity is about managing risks and to ascertain that, to a certain extent, proper procedures and adequate security measures are being taken. Exposed …

Read More »

Intensified cyber warfare amid growing tensions between Governments

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation’s computers or information networks through, for example, computer viruses or denial-of-service attacks.   Cyber Warfare was brought into focus when the suspected US/Israeli Stuxnet virus infected the computers at an Iranian …

Read More »

Military Race for Integrated Cyber, Space, EW, Signals intelligence and Communications capability for Information Dominance

Joint Publication (JP 1-02) defined the electromagnetic spectrum as the “range of frequencies of electromagnetic radiation from zero to infinity” (U.S. Joint Chiefs of Staff, 2010b). In a more detailed interpretation, the electromagnetic spectrum is a series of frequencies  from the lowest to the highest frequency (longest to shortest wavelength), …

Read More »
error: Content is protected !!